0

testing Online Quiz - 48

Description: testing Online Quiz - 48
Number of Questions: 20
Created by:
Tags: testing
Attempted 0/20 Correct 0 Score 0
  1. Rely on Path Based Testing

  2. Exercise the Logical Conditions in a Program module

  3. Select Test Paths based on the locations and uses of variables

  4. Focus on Testing the Validity of loop constructs


Correct Option: B
  1. Rely on Path Based Testing

  2. Exercise the Logical Conditions in a Program module

  3. Select Test Paths based on the locations and uses of variables

  4. Focus on Testing the Validity of loop constructs


Correct Option: C
  1. Incorrect or Missing functions

  2. Interface Errors

  3. Performance Errors

  4. All of the Above

  5. None of the Above


Correct Option: D

Fault-based Testing is best reserved for

  1. Conventional Software Testing

  2. Operations and classes that are Critical or Suspect

  3. Use-Case Validation

  4. White-Box Testing of Operator Algorithms


Correct Option: B
  1. Boundary Value Analysis

  2. Error Guessing

  3. Equivalence Partitioning

  4. Both B and C


Correct Option: C
  1. Observability

  2. Simplicity

  3. Stability

  4. All of the Above


Correct Option: D
  1. Statement Coverage

  2. Path Coverage

  3. Branch Coverage

  4. None of the Above


Correct Option: A
  1. Authentication

  2. Authorization

  3. Integrity

  4. Availability

  5. Confidentiality


Correct Option: A,B,C,D,E

Key words used for SQL Injection attack (select more than one)

  1. CREATE

  2. UNION

  3. WHERE

  4. OR


Correct Option: B,D
  1. Website with URL https

  2. Website with URL http

  3. Windows application

  4. Only Website with URL http & Windows application


Correct Option: A,B,C
  1. Buffer overflows

  2. SQL Injection

  3. Cross site scripting

  4. Authentication

  5. Authorization


Correct Option: A,B,C

Client side validation is advised for enforcing the security

  1. True

  2. False


Correct Option: B
  1. Denial of service

  2. Executing malicious content

  3. Information disclosure

  4. All of the above


Correct Option: D
  1. Windows authentication

  2. SQL authentication

  3. Form based authentication

  4. Basic authentication

  5. Passport authentication

  6. All of the above


Correct Option: A,C,D,E
  1. SqlDataAdapter myCommand = new SqlDataAdapter( "SELECT CustomerName, Email, PhoneNo FROM users WHERE cust_id = '" + txtuser.Text + "'", myConnection);

  2. CREATE PROCEDURE procGetUser @custId VARCHAR(5) AS SELECT CustomerName, Email, PhoneNo FROM Customers WHERE cust_id = @custId

  3. SqlDataAdapter myDataAdapter = new SqlDataAdapter("SELECT CustomerName, Email, PhoneNo FROM Customers WHERE cust_id = @cust_id", connection); myCommand.SelectCommand.Parameters.Add("@cust_id", SqlDbType.VarChar,

  4. All the above


Correct Option: A

Select the security best practice techniques (select more than one)

  1. Provide highest privilege

  2. Encode all client supplied data

  3. Use of parameterized stored procedure

  4. Providing detailed error message


Correct Option: B,C,D

Select the threat category for the below request-response Web Request - http://www.somesite.com/page.asp?pageid=10&lang=en&title=Section%20Title Response -

Section Title

  1. SQL Injection

  2. Cross Site Scripting

  3. Authentication

  4. Forceful browsing


Correct Option: B
- Hide questions